diff --git a/security/split-gpg.md b/security/split-gpg.md index 64d0b759..becc456d 100644 --- a/security/split-gpg.md +++ b/security/split-gpg.md @@ -171,6 +171,19 @@ passphrase from your (sub)key(s) in order to get Split-GPG working correctly. As mentioned above, we do not believe PGP key passphrases to be significant from a security perspective. +### Thunderbird + Enigmail in Qubes 4.0 ### + +New qrexec policies in Qubes R4.0 by default require the user to enter the name +of the domain containing GPG keys each time it is accessed. To improve usability +for Thunderbird+Enigmail, in `dom0` place the following line at the top of the file +`/etc/qubes-rpc/policy/qubes.Gpg`: + +``` +work-email work-gpg allow +``` +where `work-email` is the Thunderbird+Enigmail AppVM and `work-gpg` contains +your GPG keys. + ## Using Git with Split GPG ## Git can be configured to used with Split-GPG, something useful if you would @@ -227,20 +240,6 @@ displayed to accept this.
-Qubes 4.0 ---------- -New qrexec policies in Qubes R4.0 by default require the user to enter the name -of the domain containing GPG keys each time it is accessed. To improve usability -for Thunderbird+Enigmail, in `dom0` place the following line at the top of the file -`/etc/qubes-rpc/policy/qubes.Gpg`: - -``` -work-email work-gpg allow -``` -where `work-email` is the Thunderbird+Enigmail AppVM and `work-gpg` contains -your GPG keys. - -
Advanced: Using Split GPG with Subkeys --------------------------------------